Description
A path traversal vulnerability exists within GoAnywhere MFT before 6.8.3 that utilize self-registration for the GoAnywhere Web Client. This vulnerability could potentially allow an external user who self-registers with a specific username and/or profile information to gain access to files at a higher directory level than intended.
References
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml
https://www.goanywhere.com/support/advisory/68x
https://www.goanywhere.com/support/release-notes/mft?limit=0
https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml
https://www.goanywhere.com/support/advisory/68x
https://www.goanywhere.com/support/release-notes/mft?limit=0
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 · Medium
Information
Source identifier
Vulnerability status
Modified
Published
2022-07-27T21:15:08.130Z
3 years agoLast modified
2024-11-21T05:34:46.930Z
1 year ago